AT&T MERLIN LEGEND Reference page 139

Hide thumbs Also See for MERLIN LEGEND:
Table of Contents

Advertisement

Customer Support Information
The voice mail system, through proper administration, can help you reduce the
risk of unauthorized persons gaining access to the network. However, phone
numbers and authorization codes can be compromised when overheard in a
public location, are lost through theft of a wallet or purse containing access
information, or through carelessness (writing codes on a piece of paper and
improperly discarding them). Additionally, hackers may use a computer to dial
an access code and then publish the information to other hackers. Substantial
charges can accumulate quickly. It is your responsibility to take appropriate
steps to implement the features properly, evaluate and administer the various
restriction levels, protect and carefully distribute access codes.
Under applicable tariffs, you will be responsible for payment of toll charges.
AT&T cannot be responsible for such charges and will not make any allowance
or give any credit resulting from unauthorized access.
To reduce the risk of unauthorized access through your voice mail system,
please observe the following procedures:
Employees who have voice mailboxes should be required to use the
passwords to protect their mailboxes.
— Have them use random sequence passwords.
— Impress upon them the importance of keeping their passwords a
secret.
— Encourage them to change their passwords regularly.
The administrator should remove any unneeded voice mailboxes from the
system immediately.
AUDIX Voice Power has the ability to limit transfers to subscribers only.
You are strongly urged to limit transfers in this manner.
Use the Hybrid/PBX or Key system administration capability to do the
following:
— Block direct access to outgoing lines and force the use of account
codes/authorization codes.
— Disallow trunk-to-trunk transfer unless required.
— Assign toll restriction levels to all AUDIX Voice Power ports or other
voice mail ports.
— If you do not need to use the Outcalling feature, completely restrict the
outward calling capability of the AUDIX Voice Power ports. Use voice
mail application features to do this.
Monitor SMDR reports or Call Accounting System reports for outgoing
calls that might be originated by AUDIX Voice Power ports or other voice
mail ports.
B - 8

Advertisement

Table of Contents
loading

Table of Contents